00731nam2 22002171i 450 990002275390403321000227539FED01000227539(Aleph)000227539FED0100022753920030801d--------km-y0itay50------baDietary intake of carbohydrate in relation to diabetes and atherosclerosis. London-New York, 1968, v. 2, p. 169-184.001000220279Yudkin,John94737ITUNINARICAUNIMARCBK990002275390403321FFABCDietary intake of carbohydrate in relation to diabetes and atherosclerosis. London-New York, 1968, v. 2, p. 169-184384979UNINAING0103572nam 22007935 450 991048558660332120251225173531.03-030-79318-410.1007/978-3-030-79318-0(CKB)5590000000503299(MiAaPQ)EBC6676343(Au-PeEL)EBL6676343(OCoLC)1257549556(PPN)257358692(BIP)80662965(BIP)80304495(DE-He213)978-3-030-79318-0(EXLCZ)99559000000050329920210621d2021 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierSocio-Technical Aspects in Security and Trust 10th International Workshop, STAST 2020, Virtual Event, September 14, 2020, Revised Selected Papers /edited by Thomas Groß, Luca Viganò1st ed. 2021.Cham :Springer International Publishing :Imprint: Springer,2021.1 online resource (211 pages)Security and Cryptology,2946-1863 ;128123-030-79317-6 Personality and Behavior -- Behavior in Face of Adversaries -- Smart Environments -- Decentralized Systems and Digital Ledgers -- Reflections on Socio-Technical Aspects of Security.This book constitutes the refereed post-conference proceedings of the 10th International Workshop on Socio-Technical Aspects in Security and Trust, STAST 2020, held as a virtual event, in September 2020. The 8 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 42 submissions and are organized in the following topical sections: personality and behavior; behavior in face of adversaries; smart environments; decentralized systems and digital ledgers; and reflections on socio-technical aspects of security. The Chapter “Statistical Reliability of 10 Years of Cyber Security User Studies” is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.Security and Cryptology,2946-1863 ;12812Data protectionComputer networksComputers, Special purposeComputer systemsCryptographyData encryption (Computer science)Application softwareData and Information SecurityComputer Communication NetworksSpecial Purpose and Application-Based SystemsComputer System ImplementationCryptologyComputer and Information Systems ApplicationsData protection.Computer networks.Computers, Special purpose.Computer systems.Cryptography.Data encryption (Computer science).Application software.Data and Information Security.Computer Communication Networks.Special Purpose and Application-Based Systems.Computer System Implementation.Cryptology.Computer and Information Systems Applications.005.8Gross Thomas1954-Viganò LucaMiAaPQMiAaPQMiAaPQBOOK9910485586603321Socio-Technical Aspects in Security and Trust2251894UNINA